AI-Powered Portfolio Monitoring
Track covenants across your entire portfolio. AI-powered analysis on dedicated infrastructure under our exclusive control. Sovereign by architecture. Know before your lenders do.
No hardware ships to your fund. Bare-metal infrastructure owned and operated by NHN. Fund connects via encrypted tunnel. Enterprise AI at small-firm prices.
73% of PE firms cite covenant monitoring as a major operational bottleneck.
Covenant tracking doesn't scale. As your portfolio grows, spreadsheets become unmanageable, error-prone, and impossible to audit.
You find out about breaches after lenders call. By then, it's too late to negotiate or remediate. You're always playing catch-up.
Sensitive financial data scattered across cloud tools. When LPs ask where their portfolio data lives, what's your answer?
Institutional-grade monitoring, delivered on your infrastructure.
AI automatically tests covenants against thresholds. Debt/EBITDA, Interest Coverage, Current Ratio - all monitored in real-time.
Upload financials in any format. Our AI extracts the data you need without manual entry or reformatting.
Your data stays on your infrastructure. No third-party clouds. Full data sovereignty for LP compliance.
Stop staring at twelve spreadsheets. COVENANT rolls every portfolio company's covenant posture into one health score the investment committee can read in three seconds.
Real-time covenant testing across every LBO in the book. Green means tested and clean. Yellow means within ten percent of a covenant trip. Red means breach. Click through to any company for the full test-by-test drill-down.
Illustrative dashboard. Live product uses your fund's covenant schedule and financials.
One breach. Four defaults. You are seeing the topological map of how floodwaters spread across your capital structure before the original lender's demand letter lands. Predictive contagion modeling is in beta with founder-tier customers; production deployment targets Q3 2026.
Company A trips a leverage covenant. The radar picks up the contagion as it spreads: COVENANT's lender-graph analysis surfaces every shared-lender exposure, MFN clause, and cross-default provision that drags B, C, and D into the storm before the original lender's demand letter lands. Your workout team has a two-week head start.
Today's radar detects breach. The contagion graph predicts which other borrowers' collateral, lender-graph position, and cross-default provisions put them at risk before a breach trips. The graph is built directly on the covenant-agreement parsing the product already does: shared-lender pairs, pledged-collateral overlaps, MFN clause clusters, parent-subsidiary guarantee chains.
Beta opens to founder-tier customers in Q3 2026. We are deliberately not shipping it as a real-time dashboard until the false-positive rate is lower than the human-analyst baseline. Predicting contagion that does not happen is alert fatigue dressed up as foresight.
Out of scope: equity prices, CDS spreads, peer-comp valuations, real-time market data. The contagion graph is built from the covenant agreements the fund already holds. No external market data feeds, no shadow-banking concerns.
A radar that fires on every drizzle trains its users to mute notifications. COVENANT routes every signal through a three-tier confidence classifier before it reaches a human. Pager-worthy signals stay pager-worthy.
Tier 1
High confidence. Cross-default cascade risk detected across 2+ borrowers with connected exposure.
Routes to: pager credit committee
Response: within 24 hours
Calibrated to fire under 5x per quarter per 200-facility fund.
Tier 2
Medium confidence. Single-borrower covenant ratio deteriorating, debt-service coverage dropping past warning threshold, unplanned capex mid-quarter.
Routes to: portfolio manager daily digest
Response: within 5 business days
Per-PM sensitivity controls tune the floor.
Tier 3
Low confidence. Early signals, single data-point drift, not yet indicative of stress. Logged for pattern detection.
Routes to: weekly portfolio summary
Response: no immediate action
Feeds quarterly sensitivity recalibration.
Alert-history analytics recalibrate sensitivity quarterly based on tracked outcomes.
"Your last 20 Tier 2 alerts, 14 actionable, 6 noise, sensitivity auto-recalibrated." The radar gets sharper every quarter. The boy-who-cried-wolf problem is engineered out by design.
Tier 2 Density Cap
A daily digest that bundles twelve lukewarm signals is just a junk drawer with a calendar. COVENANT caps the Tier 2 daily digest at the 3 most relevant signals per portfolio manager, with a steady-state guarantee of under 5 Tier 2 alerts per week.
When signal volume would exceed the cap, the system makes a hard decision: promote the highest-confidence candidate to Tier 1 (Cascade Warning, pager), or demote the lowest to Tier 3 (Watch, weekly digest). Never overflows.
In the alert preferences UI: "Your current digest is averaging 2.4 signals per day." The PM sees the cap working in real time.
Tier-2 Auto-Promotion Audit Log
When the density cap forces a promote-or-demote, the system writes a structured audit row that the PM can re-open six months later. Confidence delta, alternatives considered, and a deep link to the underlying signal. Auto-triage logic stops being a black box.
During postmortem, the PM clicks audit_link and sees the full alert tree: which signals were considered, why this one beat them, what the confidence model weighted. If the model was wrong, the row is the receipt.
Conservative-By-Default
COVENANT's per-PM sensitivity sliders ship with conservative defaults that catch roughly 95% of correlated breach signals as Tier 1. PMs can dial sensitivity down to fit their portfolio's volatility profile, but the factory default catches the "we should have been paged" cases where demoting a signal would later constitute a breach of fiduciary duty.
Every slider adjustment is logged, timestamped, and reasoned - the PM enters a short note. When the inevitable postmortem happens, the audit log answers "why was this signal demoted" with a dated reason in the PM's own words. The tuning tool is not a vendor liability shield. The defaults are the shield.
COVENANT is an automated triage engine that flips the 90/10 ratio of senior-analyst time. The senior keeps the judgment calls. The radar handles the boilerplate.
Before COVENANT
Your senior analysts spend 90% of their day reading boilerplate covenants, parsing standard reporting submissions, and re-keying numbers from PDFs into spreadsheets. The judgment calls (workout decisions, structural risk reads, intercreditor tactics) get the last 10% of an exhausted brain.
After COVENANT
The triage engine ingests, parses, ratios, and tier-classifies every submission. The senior analyst opens the day looking at a tier-1 shortlist of cascade-risk signals already enriched with the underlying ratios and clause references. The judgment work gets a fresh brain.
What Stays Human
Every Cascade Warning is acknowledged by a human portfolio manager who has final disposition authority. The triage engine never autonomously fires a workout call, never autonomously closes a borrower, never makes a credit decision without a human sign-off. Multiplier, not substitute.
"An analyst multiplier, not an analyst substitute. The system proves to the human analyst that it knows exactly what it cannot see."
COVENANT continuously monitors the 80% of your book with clean data AND auto-generates targeted compliance enforcement requests to the 20% lagging behind. The radar does not wait for the data. The radar hunts the data down.
Per-Borrower Data Quality Grade
A
Real-time API integration direct from the borrower's accounting system.
B
Scheduled daily structured push via Onboarding Wizard.
C
Monthly structured financial statements via Onboarding Wizard.
D
Quarterly structured financials (the legacy baseline).
F
Parsing failed. The model could not read this borrower's most recent submission. Routed to Compliance Friction.
COVENANT directs scarce human attention to the 20% that actively requires it, while fully automating the 80% that has clean data pipelines.
Every sub-A borrower ships with an auto-generated Path to A action list: "Re-negotiate reporting requirements in next amendment cycle," "Deploy Onboarding Wizard for this borrower," "Request API integration for upcoming refinancing." Portfolio coverage compounds as the action list closes out.
Parsing Confidence, Not Borrower Default
The most common silent-failure mode in cloud covenant tools is conflating data quality with parsing confidence. A scanned PDF with a watermark looks identical to a scanned PDF that says "we breached our covenant" - if the parser fails on either, the system goes quiet. COVENANT refuses that conflation. Every F surfaces the precise failure mode and the action it triggers.
Failure Mode 1
Watermark / scan artifact
Borrower stamped a CONFIDENTIAL watermark across the income statement. Parser logs parse_fail.watermark_overlap. Routed to Compliance Friction with a request for an unwatermarked submission.
Failure Mode 2
OCR confidence floor
Image-only PDF, OCR confidence below floor across the financial-statement table. Parser logs parse_fail.ocr_below_floor. Routed for human escalation, never silently scored.
Failure Mode 3
Missing pages
Submission references Schedule 5.02 but the schedule was not included. Parser logs parse_fail.missing_schedule. Compliance request fires same-day, citing the contractual reporting obligation.
An F is a transparent admission that the radar could not see. The PM gets a named failure mode, a routing decision, and a tracked request. The system never goes silent on a borrower it cannot read.
Historical F-Grade Quarantine
The v6 parsing-confidence release made every new F-grade route to a named failure mode. F-grades issued before the release were silent on which failure mode caused them. The Quarantine Tool closes that gap. Turn the liability into a demonstration of customer care.
Pre-v6 F-Grade Quarantine · Admin Console
47 documents, 11 borrowers
Pre-v6 F-grades
47
Issued 2025-10 through 2026-04-15
Borrowers affected
11
Includes 3 with current Tier-2 signals
Re-parse ETA
~14 min
Sovereign inference, customer-scoped capacity
One-Click Action
Quarantine all pre-v6 F-grade documents pending re-parse. The system routes each into the Compliance Friction queue with a clear category on re-parse: parse_fail.watermark_overlap, parse_fail.ocr_below_floor, parse_fail.missing_schedule, or actual_default.
Quarantined documents do not affect the live A-F grade view until the re-parse completes. Each re-parsed document writes a structured audit row recording the original failure-mode category and the routing decision.
"Turn the liability into a demonstration of customer care." The forward-only fix becomes a portfolio-wide cleanup the PM can run before the next quarterly review.
Explainability Dashboard
Open the portfolio view. The header is a coverage map: how much of the book is on clean pipelines, how much is delayed, how many borrowers the parser could not read, and how many compliance requests are outstanding right now.
Portfolio Data Coverage · 80 borrowers
Updated 2026-04-26 08:14 ET
80%
A / B clean
64 borrowers, real-time or daily push
15%
C / D delayed
12 borrowers, monthly or quarterly cadence
5%
F unreadable
4 borrowers, parser failure logged per failure mode
Compliance Friction
12 borrowers with open requests
Overdue > 7 days
3 borrowers, escalated to PM
Path-To-A Closures (30d)
+5 borrowers, coverage trending up
Risk officers stop seeing "the radar found a breach." They start seeing "the radar covers 95% of the book and is actively closing the remaining 5%." The blind spot becomes a tracked metric, not a hidden liability.
F-Grade Resolution Workflow
F-grade is a parse failure, not a borrower default. The student is not dumb, the paper is destroyed. When the engine quarantines a document, the resolution workflow walks the analyst from "we cannot read page 24" to a clean re-parse without spamming a key sponsor over a blurry scan.
Step 1 · Quarantine Queue Surface
The quarantine queue surfaces every F-grade document with the exact failure mode and the exact pages that failed. The analyst sees a per-document card, not a flat error log.
Step 2 · Drag-Drop Higher-Res Replacement
If the fund already has a clean copy, the analyst drags it into the quarantine card. The engine re-parses immediately and writes the resolution path to the audit log. No borrower contact required.
Step 3 · Semi-Automated Borrower Request (Analyst Reviews + Sends)
If the fund needs to ask the borrower, the engine drafts a templated secure request through the fund's existing client portal. The draft identifies the failure, names the affected pages, and proposes a return cadence. The analyst reviews and clicks send. The system never sends without a human gate; sponsors are never spammed by a parser.
To: SilverPeak Compliance Officer
Subject: Q1 2026 Compliance Certificate, three pages need re-scan
Hi team. Our intake system received the Q1 2026 Compliance Certificate but pages 17, 24, and 38 are below our OCR confidence floor. Could you re-send those three pages at 300 DPI or higher? Thanks. Reply by Friday helps us close out the quarter on schedule.
Step 4 · Audit Log Captures Every Path
Every quarantine event and every resolution path writes a structured audit row. The compliance team can prove, document by document, that no F-grade parse failure was silently dropped, that the human-gated borrower request was reviewed before sending, and that the resolution closed within SLA.
"It is the ultimate admission that while the machine can scan the horizon, you still need a human to navigate the storm." The workflow keeps the analyst on the bridge, not in the engine room.
A-F Grading: Active Enforcement
When a borrower hits a D or F grade, COVENANT does not wait. The system auto-generates a templated compliance-enforcement request to the borrower's CFO or CRO, referencing the specific contractual reporting obligations the borrower signed, requesting the missing data, and opening a tracked response timer.
Non-responsive borrowers surface as a daily Compliance Friction report on the PM dashboard, sorted by days-since-request and by underlying credit exposure. The 20% is not celebrated as a blind spot. The 20% is hunted until it becomes the 80%.
The companies with the worst financial-reporting hygiene are historically the first to default in a liquidity crisis. Active enforcement does not pretend otherwise; it goes and gets the data.
CISO Fast-Track Bridge
The COVENANT SOC 2 Equivalence Document is a CISO Fast-Track Bridge for early adopters: it translates the dedicated-infrastructure architecture into the vocabulary a cloud-era SOC 2 checklist already understands. It is not a substitute for an independent audit. It is the bridge that gets early-mover credit funds deployed while the independent audit completes.
Because borrower financial data routes only to dedicated infrastructure under NHN's exclusive control, with no third-party AI vendors and no cloud middlemen in the inference chain, the standard multi-tenant SaaS security risks are bypassed entirely. The architecture itself is the primary security control. The Bridge is the roadmap that proves the sovereign architecture requires a lower burden of proof.
Independent Big-4 SOC 2 Type 2 audit target: Q2 2027. Funded by founder-tier subscription revenue. Published on a public calendar so CISOs can plan around it rather than squint at a self-attested document.
SOC 2 Equivalence v2: Fortress Framing
SOC 2 was written for a world where the vendor holds your data. Every control on that checklist exists to govern how the vendor protects what they hold. COVENANT collapses the threat model by never holding the data in the first place. The structural answer is mathematically stronger than the checklist answer.
"Decentralizing the honeypot is mathematically safer than protecting a central target." A SOC 2 audit certifies the central target is well-protected. COVENANT eliminates the target.
Hardware EOL Flex Policy
The fund never touches hardware. NHN owns and operates the dedicated infrastructure under our exclusive control; the fund connects via encrypted tunnel from authorized workstations. So what does the EOL Flex Policy actually mean to a fund procurement committee?
It means your subscription, on the flat $4,000 monthly rate or any founder-cohort tier (T1 at $1,449 per year through T5 at $3,499 per year), includes automatic zero-downtime compute upgrades at our facility when the underlying Mac hardware ages out. There is no CapEx surprise. There is no fund-side migration window. There is no hardware refresh you have to budget for.
Sovereign Guarantee. Hardware lifecycle risk lives with NHN. The fund's only obligation is the subscription. Procurement committees can underwrite the spend without modeling a hardware refresh cycle.
Drag the slider to match your portfolio. The math comes from finance teams who still run covenant tracking in Excel.
Estimates based on industry PE ops benchmarks. Your mileage varies with fund size, covenant complexity, and how busy your FP&A team already is.
Two ways to buy. Pick the one that fits how your fund procures software.
Option A · Monthly Recurring
For funds whose procurement requires monthly billing or an exit ramp inside 12 months. Net new cash spend, no annual commit.
Option B · Annual Founder Ladder
For funds happy to commit annually in exchange for a defined founder rate. Tier prices rise as licenses sell. Discount is real, the window is finite.
Both options unlock the same product on the same architecture. Procurement teams cross-verify pricing at finance.nohumannearby.com - the prices on this page are the only authoritative quote.
Once they're gone, it's full price. Lock in your rate before the next tier fills.